¨Use HTTPS for encrypted web
traffic
¨Use SSH for encrypted login sessions
–Avoid using Telnet
¨Use S/MIME or PGP for encrypted
email
¨Pay attention to warning messages on
your browser
and SSH client
¨Configuring Ethernet switch with MAC
address
of machine using that port to prevent MAC flooding and arpspoofing
¨Use static ARP tables on the end
systems
¨